Date:         Mon, 22 Oct 2007 15:17:23 -0500
Reply-To:     Troy Dawson 
Sender:       Security Errata for Scientific Linux
              
From:         Troy Dawson 
Subject:      Security ERRATA for kernel on SL5.x i386/x86_64
Comments: To: scientific-linux-errata@fnal.gov

Synopsis:	Important: kernel security update
Issue date:	2007-10-22
CVE Names:	CVE-2007-3105 CVE-2007-3380 CVE-2007-3513
                 CVE-2007-3731 CVE-2007-3848 CVE-2007-3850
                 CVE-2007-4308 CVE-2007-4133 CVE-2007-4574

These new kernel packages contain fixes for the following security issues:

* A flaw was found in the backported stack unwinder fixes in Red Hat
Enterprise Linux 5.  On AMD64 and Intel 64 platforms, a local user could
trigger this flaw and cause a denial of service. (CVE-2007-4574, Important)

* A flaw was found in the handling of process death signals. This allowed a
local user to send arbitrary signals to the suid-process executed by that
user. A successful exploitation of this flaw depends on the structure of
the suid-program and its signal handling. (CVE-2007-3848, Important)

* A flaw was found in the Distributed Lock Manager (DLM) in the cluster
manager. This allowed a remote user who is able to connect to the DLM port
to cause a denial of service. (CVE-2007-3380, Important)

* A flaw was found in the aacraid SCSI driver. This allowed a local user to
make ioctl calls to the driver which should otherwise be restricted to
privileged users. (CVE-2007-4308, Moderate)

* A flaw was found in the prio_tree handling of the hugetlb support that
allowed a local user to cause a denial of service. This only affected
kernels with hugetlb support. (CVE-2007-4133, Moderate)

* A flaw was found in the eHCA driver on PowerPC architectures that allowed
a local user to access 60k of physical address space. This address space
could contain sensitive information. (CVE-2007-3850, Moderate)

* A flaw was found in ptrace support that allowed a local user to cause a
denial of service via a NULL pointer dereference. (CVE-2007-3731, Moderate)

* A flaw was found in the usblcd driver that allowed a local user to cause
a denial
of service by writing data to the device node. To exploit this issue, write
access to the device node was needed. (CVE-2007-3513, Moderate)

* A flaw was found in the random number generator implementation that
allowed a local user to cause a denial of service or possibly gain
privileges. If the root user raised the default wakeup threshold over the
size of the output pool, this flaw could be exploited. (CVE-2007-3105, Low)

In addition to the security issues described above, several bug fixes
preventing possible system crashes and data corruption were also included.

SL 5.x

   SRPMS:
kernel-2.6.18-8.1.15.el5.src.rpm
   i386:
kernel-2.6.18-8.1.15.el5.i686.rpm
kernel-devel-2.6.18-8.1.15.el5.i686.rpm
kernel-doc-2.6.18-8.1.15.el5.noarch.rpm
kernel-headers-2.6.18-8.1.15.el5.i386.rpm
kernel-module-fuse-2.6.18-8.1.15.el5-2.6.3-1.el5.i686.rpm
kernel-module-fuse-2.6.18-8.1.15.el5PAE-2.6.3-1.el5.i686.rpm
kernel-module-fuse-2.6.18-8.1.15.el5xen-2.6.3-1.el5.i686.rpm
kernel-module-ipw3945-2.6.18-8.1.15.el5-1.2.0-1.sl5.i686.rpm
kernel-module-ipw3945-2.6.18-8.1.15.el5PAE-1.2.0-1.sl5.i686.rpm
kernel-module-ipw3945-2.6.18-8.1.15.el5xen-1.2.0-1.sl5.i686.rpm
kernel-module-madwifi-2.6.18-8.1.15.el5-0.9.3.1-11.sl5.i686.rpm
kernel-module-madwifi-2.6.18-8.1.15.el5PAE-0.9.3.1-11.sl5.i686.rpm
kernel-module-madwifi-2.6.18-8.1.15.el5xen-0.9.3.1-11.sl5.i686.rpm
kernel-module-madwifi-hal-2.6.18-8.1.15.el5-0.9.3.1-11.sl5.i686.rpm
kernel-module-madwifi-hal-2.6.18-8.1.15.el5PAE-0.9.3.1-11.sl5.i686.rpm
kernel-module-madwifi-hal-2.6.18-8.1.15.el5xen-0.9.3.1-11.sl5.i686.rpm
kernel-module-ndiswrapper-2.6.18-8.1.15.el5-1.41-1.SL.i686.rpm
kernel-module-ndiswrapper-2.6.18-8.1.15.el5PAE-1.41-1.SL.i686.rpm
kernel-module-ndiswrapper-2.6.18-8.1.15.el5xen-1.41-1.SL.i686.rpm
kernel-module-openafs-2.6.18-8.1.15.el5-1.4.4-42.SL5.i686.rpm
kernel-module-openafs-2.6.18-8.1.15.el5PAE-1.4.4-42.SL5.i686.rpm
kernel-module-openafs-2.6.18-8.1.15.el5xen-1.4.4-42.SL5.i686.rpm
kernel-module-r1000-2.6.18-8.1.15.el5-1.05-1.sl.i686.rpm
kernel-module-r1000-2.6.18-8.1.15.el5PAE-1.05-1.sl.i686.rpm
kernel-module-r1000-2.6.18-8.1.15.el5xen-1.05-1.sl.i686.rpm
kernel-PAE-2.6.18-8.1.15.el5.i686.rpm
kernel-PAE-devel-2.6.18-8.1.15.el5.i686.rpm
kernel-xen-2.6.18-8.1.15.el5.i686.rpm
kernel-xen-devel-2.6.18-8.1.15.el5.i686.rpm
  Dependancies
kernel-module-fuse-2.6.18-8.1.15.el5-2.6.3-1.el5.i686.rpm
kernel-module-fuse-2.6.18-8.1.15.el5PAE-2.6.3-1.el5.i686.rpm
kernel-module-fuse-2.6.18-8.1.15.el5xen-2.6.3-1.el5.i686.rpm
kernel-module-ipw3945-2.6.18-8.1.15.el5-1.2.0-1.sl5.i686.rpm
kernel-module-ipw3945-2.6.18-8.1.15.el5PAE-1.2.0-1.sl5.i686.rpm
kernel-module-ipw3945-2.6.18-8.1.15.el5xen-1.2.0-1.sl5.i686.rpm
kernel-module-madwifi-2.6.18-8.1.15.el5-0.9.3.1-11.sl5.i686.rpm
kernel-module-madwifi-2.6.18-8.1.15.el5PAE-0.9.3.1-11.sl5.i686.rpm
kernel-module-madwifi-2.6.18-8.1.15.el5xen-0.9.3.1-11.sl5.i686.rpm
kernel-module-madwifi-hal-2.6.18-8.1.15.el5-0.9.3.1-11.sl5.i686.rpm
kernel-module-madwifi-hal-2.6.18-8.1.15.el5PAE-0.9.3.1-11.sl5.i686.rpm
kernel-module-madwifi-hal-2.6.18-8.1.15.el5xen-0.9.3.1-11.sl5.i686.rpm
kernel-module-ndiswrapper-2.6.18-8.1.15.el5-1.41-1.SL.i686.rpm
kernel-module-ndiswrapper-2.6.18-8.1.15.el5PAE-1.41-1.SL.i686.rpm
kernel-module-ndiswrapper-2.6.18-8.1.15.el5xen-1.41-1.SL.i686.rpm
kernel-module-openafs-2.6.18-8.1.15.el5-1.4.4-42.SL5.i686.rpm
kernel-module-openafs-2.6.18-8.1.15.el5PAE-1.4.4-42.SL5.i686.rpm
kernel-module-openafs-2.6.18-8.1.15.el5xen-1.4.4-42.SL5.i686.rpm
kernel-module-r1000-2.6.18-8.1.15.el5-1.05-1.sl.i686.rpm
kernel-module-r1000-2.6.18-8.1.15.el5PAE-1.05-1.sl.i686.rpm
kernel-module-r1000-2.6.18-8.1.15.el5xen-1.05-1.sl.i686.rpm
   x86_64:
kernel-2.6.18-8.1.15.el5.x86_64.rpm
kernel-devel-2.6.18-8.1.15.el5.x86_64.rpm
kernel-doc-2.6.18-8.1.15.el5.noarch.rpm
kernel-headers-2.6.18-8.1.15.el5.x86_64.rpm
kernel-module-fuse-2.6.18-8.1.15.el5-2.6.3-1.SL.x86_64.rpm
kernel-module-fuse-2.6.18-8.1.15.el5xen-2.6.3-1.SL.x86_64.rpm
kernel-module-ipw3945-2.6.18-8.1.15.el5-1.2.0-1.sl5.x86_64.rpm
kernel-module-ipw3945-2.6.18-8.1.15.el5xen-1.2.0-1.sl5.x86_64.rpm
kernel-module-madwifi-2.6.18-8.1.15.el5-0.9.3.1-11.sl5.x86_64.rpm
kernel-module-madwifi-2.6.18-8.1.15.el5xen-0.9.3.1-11.sl5.x86_64.rpm
kernel-module-madwifi-hal-2.6.18-8.1.15.el5-0.9.3.1-11.sl5.x86_64.rpm
kernel-module-madwifi-hal-2.6.18-8.1.15.el5xen-0.9.3.1-11.sl5.x86_64.rpm
kernel-module-ndiswrapper-2.6.18-8.1.15.el5-1.41-1.SL.x86_64.rpm
kernel-module-ndiswrapper-2.6.18-8.1.15.el5xen-1.41-1.SL.x86_64.rpm
kernel-module-openafs-2.6.18-8.1.15.el5-1.4.4-42.SL5.x86_64.rpm
kernel-module-openafs-2.6.18-8.1.15.el5xen-1.4.4-42.SL5.x86_64.rpm
kernel-module-r1000-2.6.18-8.1.15.el5-1.05-1.sl.x86_64.rpm
kernel-module-r1000-2.6.18-8.1.15.el5xen-1.05-1.sl.x86_64.rpm
kernel-xen-2.6.18-8.1.15.el5.x86_64.rpm
kernel-xen-devel-2.6.18-8.1.15.el5.x86_64.rpm
  Dependancies
kernel-module-fuse-2.6.18-8.1.15.el5-2.6.3-1.SL.x86_64.rpm
kernel-module-fuse-2.6.18-8.1.15.el5xen-2.6.3-1.SL.x86_64.rpm
kernel-module-ipw3945-2.6.18-8.1.15.el5-1.2.0-1.sl5.x86_64.rpm
kernel-module-ipw3945-2.6.18-8.1.15.el5xen-1.2.0-1.sl5.x86_64.rpm
kernel-module-madwifi-2.6.18-8.1.15.el5-0.9.3.1-11.sl5.x86_64.rpm
kernel-module-madwifi-2.6.18-8.1.15.el5xen-0.9.3.1-11.sl5.x86_64.rpm
kernel-module-madwifi-hal-2.6.18-8.1.15.el5-0.9.3.1-11.sl5.x86_64.rpm
kernel-module-madwifi-hal-2.6.18-8.1.15.el5xen-0.9.3.1-11.sl5.x86_64.rpm
kernel-module-ndiswrapper-2.6.18-8.1.15.el5-1.41-1.SL.x86_64.rpm
kernel-module-ndiswrapper-2.6.18-8.1.15.el5xen-1.41-1.SL.x86_64.rpm
kernel-module-openafs-2.6.18-8.1.15.el5-1.4.4-42.SL5.x86_64.rpm
kernel-module-openafs-2.6.18-8.1.15.el5xen-1.4.4-42.SL5.x86_64.rpm
kernel-module-r1000-2.6.18-8.1.15.el5-1.05-1.sl.x86_64.rpm
kernel-module-r1000-2.6.18-8.1.15.el5xen-1.05-1.sl.x86_64.rpm


NOTE: At the time of this writting, The Upstream Vendor had not released the 
source rpm's for the GFS kernel modules.  When they do, we will recompile them 
and push them out.  But we felt it was better to get the kernel out as soon as 
possible.

-Connie Sieh
-Troy Dawson

SciLinux: CVE-2007-3105 kernel SL5.x i386/x86_64

Important: kernel security update

Summary

Date:         Mon, 22 Oct 2007 15:17:23 -0500Reply-To:     Troy Dawson Sender:       Security Errata for Scientific Linux              From:         Troy Dawson Subject:      Security ERRATA for kernel on SL5.x i386/x86_64Comments: To: scientific-linux-errata@fnal.govSynopsis:	Important: kernel security updateIssue date:	2007-10-22CVE Names:	CVE-2007-3105 CVE-2007-3380 CVE-2007-3513                 CVE-2007-3731 CVE-2007-3848 CVE-2007-3850                 CVE-2007-4308 CVE-2007-4133 CVE-2007-4574These new kernel packages contain fixes for the following security issues:* A flaw was found in the backported stack unwinder fixes in Red HatEnterprise Linux 5.  On AMD64 and Intel 64 platforms, a local user couldtrigger this flaw and cause a denial of service. (CVE-2007-4574, Important)* A flaw was found in the handling of process death signals. This allowed alocal user to send arbitrary signals to the suid-process executed by thatuser. A successful exploitation of this flaw depends on the structure ofthe suid-program and its signal handling. (CVE-2007-3848, Important)* A flaw was found in the Distributed Lock Manager (DLM) in the clustermanager. This allowed a remote user who is able to connect to the DLM portto cause a denial of service. (CVE-2007-3380, Important)* A flaw was found in the aacraid SCSI driver. This allowed a local user tomake ioctl calls to the driver which should otherwise be restricted toprivileged users. (CVE-2007-4308, Moderate)* A flaw was found in the prio_tree handling of the hugetlb support thatallowed a local user to cause a denial of service. This only affectedkernels with hugetlb support. (CVE-2007-4133, Moderate)* A flaw was found in the eHCA driver on PowerPC architectures that alloweda local user to access 60k of physical address space. This address spacecould contain sensitive information. (CVE-2007-3850, Moderate)* A flaw was found in ptrace support that allowed a local user to cause adenial of service via a NULL pointer dereference. (CVE-2007-3731, Moderate)* A flaw was found in the usblcd driver that allowed a local user to causea denialof service by writing data to the device node. To exploit this issue, writeaccess to the device node was needed. (CVE-2007-3513, Moderate)* A flaw was found in the random number generator implementation thatallowed a local user to cause a denial of service or possibly gainprivileges. If the root user raised the default wakeup threshold over thesize of the output pool, this flaw could be exploited. (CVE-2007-3105, Low)In addition to the security issues described above, several bug fixespreventing possible system crashes and data corruption were also included.SL 5.x   SRPMS:kernel-2.6.18-8.1.15.el5.src.rpm   i386:kernel-2.6.18-8.1.15.el5.i686.rpmkernel-devel-2.6.18-8.1.15.el5.i686.rpmkernel-doc-2.6.18-8.1.15.el5.noarch.rpmkernel-headers-2.6.18-8.1.15.el5.i386.rpmkernel-module-fuse-2.6.18-8.1.15.el5-2.6.3-1.el5.i686.rpmkernel-module-fuse-2.6.18-8.1.15.el5PAE-2.6.3-1.el5.i686.rpmkernel-module-fuse-2.6.18-8.1.15.el5xen-2.6.3-1.el5.i686.rpmkernel-module-ipw3945-2.6.18-8.1.15.el5-1.2.0-1.sl5.i686.rpmkernel-module-ipw3945-2.6.18-8.1.15.el5PAE-1.2.0-1.sl5.i686.rpmkernel-module-ipw3945-2.6.18-8.1.15.el5xen-1.2.0-1.sl5.i686.rpmkernel-module-madwifi-2.6.18-8.1.15.el5-0.9.3.1-11.sl5.i686.rpmkernel-module-madwifi-2.6.18-8.1.15.el5PAE-0.9.3.1-11.sl5.i686.rpmkernel-module-madwifi-2.6.18-8.1.15.el5xen-0.9.3.1-11.sl5.i686.rpmkernel-module-madwifi-hal-2.6.18-8.1.15.el5-0.9.3.1-11.sl5.i686.rpmkernel-module-madwifi-hal-2.6.18-8.1.15.el5PAE-0.9.3.1-11.sl5.i686.rpmkernel-module-madwifi-hal-2.6.18-8.1.15.el5xen-0.9.3.1-11.sl5.i686.rpmkernel-module-ndiswrapper-2.6.18-8.1.15.el5-1.41-1.SL.i686.rpmkernel-module-ndiswrapper-2.6.18-8.1.15.el5PAE-1.41-1.SL.i686.rpmkernel-module-ndiswrapper-2.6.18-8.1.15.el5xen-1.41-1.SL.i686.rpmkernel-module-openafs-2.6.18-8.1.15.el5-1.4.4-42.SL5.i686.rpmkernel-module-openafs-2.6.18-8.1.15.el5PAE-1.4.4-42.SL5.i686.rpmkernel-module-openafs-2.6.18-8.1.15.el5xen-1.4.4-42.SL5.i686.rpmkernel-module-r1000-2.6.18-8.1.15.el5-1.05-1.sl.i686.rpmkernel-module-r1000-2.6.18-8.1.15.el5PAE-1.05-1.sl.i686.rpmkernel-module-r1000-2.6.18-8.1.15.el5xen-1.05-1.sl.i686.rpmkernel-PAE-2.6.18-8.1.15.el5.i686.rpmkernel-PAE-devel-2.6.18-8.1.15.el5.i686.rpmkernel-xen-2.6.18-8.1.15.el5.i686.rpmkernel-xen-devel-2.6.18-8.1.15.el5.i686.rpm  Dependancieskernel-module-fuse-2.6.18-8.1.15.el5-2.6.3-1.el5.i686.rpmkernel-module-fuse-2.6.18-8.1.15.el5PAE-2.6.3-1.el5.i686.rpmkernel-module-fuse-2.6.18-8.1.15.el5xen-2.6.3-1.el5.i686.rpmkernel-module-ipw3945-2.6.18-8.1.15.el5-1.2.0-1.sl5.i686.rpmkernel-module-ipw3945-2.6.18-8.1.15.el5PAE-1.2.0-1.sl5.i686.rpmkernel-module-ipw3945-2.6.18-8.1.15.el5xen-1.2.0-1.sl5.i686.rpmkernel-module-madwifi-2.6.18-8.1.15.el5-0.9.3.1-11.sl5.i686.rpmkernel-module-madwifi-2.6.18-8.1.15.el5PAE-0.9.3.1-11.sl5.i686.rpmkernel-module-madwifi-2.6.18-8.1.15.el5xen-0.9.3.1-11.sl5.i686.rpmkernel-module-madwifi-hal-2.6.18-8.1.15.el5-0.9.3.1-11.sl5.i686.rpmkernel-module-madwifi-hal-2.6.18-8.1.15.el5PAE-0.9.3.1-11.sl5.i686.rpmkernel-module-madwifi-hal-2.6.18-8.1.15.el5xen-0.9.3.1-11.sl5.i686.rpmkernel-module-ndiswrapper-2.6.18-8.1.15.el5-1.41-1.SL.i686.rpmkernel-module-ndiswrapper-2.6.18-8.1.15.el5PAE-1.41-1.SL.i686.rpmkernel-module-ndiswrapper-2.6.18-8.1.15.el5xen-1.41-1.SL.i686.rpmkernel-module-openafs-2.6.18-8.1.15.el5-1.4.4-42.SL5.i686.rpmkernel-module-openafs-2.6.18-8.1.15.el5PAE-1.4.4-42.SL5.i686.rpmkernel-module-openafs-2.6.18-8.1.15.el5xen-1.4.4-42.SL5.i686.rpmkernel-module-r1000-2.6.18-8.1.15.el5-1.05-1.sl.i686.rpmkernel-module-r1000-2.6.18-8.1.15.el5PAE-1.05-1.sl.i686.rpmkernel-module-r1000-2.6.18-8.1.15.el5xen-1.05-1.sl.i686.rpm   x86_64:kernel-2.6.18-8.1.15.el5.x86_64.rpmkernel-devel-2.6.18-8.1.15.el5.x86_64.rpmkernel-doc-2.6.18-8.1.15.el5.noarch.rpmkernel-headers-2.6.18-8.1.15.el5.x86_64.rpmkernel-module-fuse-2.6.18-8.1.15.el5-2.6.3-1.SL.x86_64.rpmkernel-module-fuse-2.6.18-8.1.15.el5xen-2.6.3-1.SL.x86_64.rpmkernel-module-ipw3945-2.6.18-8.1.15.el5-1.2.0-1.sl5.x86_64.rpmkernel-module-ipw3945-2.6.18-8.1.15.el5xen-1.2.0-1.sl5.x86_64.rpmkernel-module-madwifi-2.6.18-8.1.15.el5-0.9.3.1-11.sl5.x86_64.rpmkernel-module-madwifi-2.6.18-8.1.15.el5xen-0.9.3.1-11.sl5.x86_64.rpmkernel-module-madwifi-hal-2.6.18-8.1.15.el5-0.9.3.1-11.sl5.x86_64.rpmkernel-module-madwifi-hal-2.6.18-8.1.15.el5xen-0.9.3.1-11.sl5.x86_64.rpmkernel-module-ndiswrapper-2.6.18-8.1.15.el5-1.41-1.SL.x86_64.rpmkernel-module-ndiswrapper-2.6.18-8.1.15.el5xen-1.41-1.SL.x86_64.rpmkernel-module-openafs-2.6.18-8.1.15.el5-1.4.4-42.SL5.x86_64.rpmkernel-module-openafs-2.6.18-8.1.15.el5xen-1.4.4-42.SL5.x86_64.rpmkernel-module-r1000-2.6.18-8.1.15.el5-1.05-1.sl.x86_64.rpmkernel-module-r1000-2.6.18-8.1.15.el5xen-1.05-1.sl.x86_64.rpmkernel-xen-2.6.18-8.1.15.el5.x86_64.rpmkernel-xen-devel-2.6.18-8.1.15.el5.x86_64.rpm  Dependancieskernel-module-fuse-2.6.18-8.1.15.el5-2.6.3-1.SL.x86_64.rpmkernel-module-fuse-2.6.18-8.1.15.el5xen-2.6.3-1.SL.x86_64.rpmkernel-module-ipw3945-2.6.18-8.1.15.el5-1.2.0-1.sl5.x86_64.rpmkernel-module-ipw3945-2.6.18-8.1.15.el5xen-1.2.0-1.sl5.x86_64.rpmkernel-module-madwifi-2.6.18-8.1.15.el5-0.9.3.1-11.sl5.x86_64.rpmkernel-module-madwifi-2.6.18-8.1.15.el5xen-0.9.3.1-11.sl5.x86_64.rpmkernel-module-madwifi-hal-2.6.18-8.1.15.el5-0.9.3.1-11.sl5.x86_64.rpmkernel-module-madwifi-hal-2.6.18-8.1.15.el5xen-0.9.3.1-11.sl5.x86_64.rpmkernel-module-ndiswrapper-2.6.18-8.1.15.el5-1.41-1.SL.x86_64.rpmkernel-module-ndiswrapper-2.6.18-8.1.15.el5xen-1.41-1.SL.x86_64.rpmkernel-module-openafs-2.6.18-8.1.15.el5-1.4.4-42.SL5.x86_64.rpmkernel-module-openafs-2.6.18-8.1.15.el5xen-1.4.4-42.SL5.x86_64.rpmkernel-module-r1000-2.6.18-8.1.15.el5-1.05-1.sl.x86_64.rpmkernel-module-r1000-2.6.18-8.1.15.el5xen-1.05-1.sl.x86_64.rpmNOTE: At the time of this writting, The Upstream Vendor had not released the source rpm's for the GFS kernel modules.  When they do, we will recompile them and push them out.  But we felt it was better to get the kernel out as soon as possible.-Connie Sieh-Troy Dawson



Security Fixes

Severity

Related News